18cse460t NDM Question Bank
18cse460t NDM Question Bank
SRM I N S T I T U T E O F S C I E N C E A N D T E C H N O L O G Y
Ramapuram Campus, BharathiSalai, Ramapuram, Chennai - 600089
QUESTIONBANK
Regulation–2018
Academic Year:2021-2022
QUESTIONBANK
UNIT-I
Telephone Network Management-Distributed Computing Environment-TCP/IP Based Networks-Communication
Protocols and Standards-Protocol Layer and Services-Challenges of IT Managers-Network Management- Network
and System Management-Network Management System Platform-Current status and future of Network
Management -Network Management Standards-Network Management Model - Organizational model-Information
Model-Management Information Trees-Communication Model, ASN.1-Terminology-Symbols and Conventions-
Functional Model.
PART-A (Multiple Choice Questions)
Q. Questions Course Competence
No Outcome BT Level
1 Which technique is based on compile-time program transformation
for accessing remote data in a distributed-memory parallel system?
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing CO1 BT1
Answer:
b) computation migration
2 Logical extension of computation migration is ___________
a) process migration
b) system migration CO1
c) thread migration BT1
d) data migration
Answer:
a) process migration
3 In distributed systems, link and site failure is detected by
___________
CO1 BT1
a) polling
b) handshaking
c) token passing
d) none of the mentioned
Answer:
b) handshaking
4 Internet provides _______ for remote login.
a) telnet
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
b) http
c) ftp CO1 BT1
d) rpc
Answer:
a) telnet
5 Which of the following statements could be valid with respect to the
ICMP (Internet Control Message Protocol)?
It reports all errors which occur during transmission.
A redirect message is used when a router notices that a packet seems CO1 BT3
to have been routed wrongly.
It informs routers when an incorrect path has been taken
The "destination unreachable" type message is used when a router
cannot locate the destination.
Answer:
(b) A redirect message is used when a router notices that a packet
seems to have been routed wrongly.
6 When the mail server sends mail to other mail servers it becomes ___
?
a.SMTP client
b.SMTP server CO1
c.Peer BT1
d.Master
Answer:
a) SMTP client
Answer:
(b) Gateway
11 The correct order of corresponding OSI layers for having
functionalities of routing and reconciling machine representation
differences with shared access resolution and ASCII test protocol is?
Network, Physical, Transport, Data link
Network, Physical, Data link, Application BT1
Network, Presentation, Data link, Application CO1
Network, Presentation, Physical, Transport
Answer:
(c) Network, Presentation, Data link, Application
12 Distributed pervasive system is also known as
a.Ubiquitous computing
b.User Interface design CO1
c.Graphical User interface BT1
d.peer to peer system
Answer:
a.Ubiquitous computing
22 The protocol data unit (PDU) for the application layer in the Internet
stack is
Segment CO1
Datagram BT1
Message
Frame
Ans: C. Message
5 What are the advantages of using UDP over TCP? CO1 BT2
BT2
3 Describe the Function of Communication model in the TCP/IP CO1 BT2
protocol suit
4 Explain the role of the Manager and Agent in the organization model CO1
BT2
5 Explain about TCP sockets in detail. CO1 BT1
UNIT-II
Introduction to SNMP, SNMP v1 model-Organization Model-System overview-SNMP v1 Information model-
Structure of Management Information Managed Objects-MIB-Object Group-System Group, Interfaces Group-
Address Translation group-IP Group- ICMP Group-TCP Group-UDP Group-SNMP v1Communication model-
Functional model SNMPv2- System Architecture, MIB Protocol- SNMPv3 Architecture and Applications-MIB
User Based Security Model-Access Control.
PART-A (Multiple Choice Questions)
Q. Questions Course Competence
No Outcome BT Level
1 Which one of the below is not the goal of the architecture in the original
specification of SNMP?
1. minimize the number and complexity of management function
2. flexible for future expansion
3. independent of architecture and mechanism of particular host and CO2 BT1
gateways
4. monitor the network objects
Ans : monitor the network objects
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
Ans: TRAP
4. Next-gen
Ans:Get-next
9 The ____ field in the SNMP PDU is an offset that points to the variable
in error
1) Community BT1
CO2
2) Enterprise
3) Error index
4) Enterprise and Community
Ans:3. Error index
10 To name objects globally, SMI uses an object identifier, Which is a
hierarchical identifier based on a ________ Structure
1.linear
2.tree CO2 BT1
3.graph
4.stack
Ans: 2.tree
11 All objects managed by SNMP are given an object identifier the object
always starts with ____
a)1.3.6.1.2.1
b)1.3.6.1.2.2
c)1.3.6.1.2.3
d)2.3.6.1.2.3 CO2 BT1
Ans: a)1.3.6.1.2.1
12 To define the data type, SMI uses fundamental ______ definitions and
adds some new definitions.
a)AMS.1 CO2 BT1
b)ASN.1
c)ASN.2
d)ASN.3
Ans:ASN.1
13 SMI has two broad categories of data type: ___ and ____
a) Simple; complex
CO2 BT3
b) Simple; Structured
c) Structured; unstructured
d)Simple ; Complex
Ans: b) Simple; Structured
14 SMI defines two structure data types: ______ and _____
a) Sequence; atomic
b)Sequence; Sequence of
c) a sequence of; array
d)List; atomic
Ans: )Sequence; Sequence of
CO2 BT3
15 The _______ordering enables a manager to access a set of variables one
after another by defining the first variable
1. lexicographic
2.linear
3.non linear
4.tree CO2 BT1
Ans:1. lexicographic
16 The GetRequest PDU is sent from the _____ to the _____ to retrieve the
value of a variable or a set of variables
1. Client; server CO2 BT1
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
2.Server;client
3.server; network
4.router; client
Ans:Client; server
17 Which one of the SNMP tool is used to Monitor the network traffic
1)Multi Router Traffic Grapher (MRTG)
2)tcpdump
3)Protocol analyser
4) SNMP Sniff
Ans:1)Multi Router Traffic Grapher (MRTG)
CO2 BT3
18 SNMP uses the services of UDP on two well-known ports,______ and
___
1)161;162
2)160;161
3)160;162
4)150:151 CO2 BT1
Ans:1)161;162
19 ____ runs the SNMP client program:___ runs the SNMP server program
1)A Manager; A Manager
2)An Agent: An Agent CO2
3)A manager; An Agent BT1
4)An Agent; a Manager
Ans:3)A manager; An Agent
25 Which one of the below is not the goal of the architecture in the
original specification of SNMP?
a. Minimize the number and complexity of management CO2 BT1
function
b. Flexible for future expansion
c. Independent of architecture and mechanism of particular host
and gateways
d. Monitor the network objects
Ans:d. Monitor the network objects
PART B (4 Marks)
1 Discuss how Functional model is differ from the Communication model CO2 BT1
2 How would you determine the IP address of the local router? CO2 BT1
6 Discus how ICMP Group protocols send the error messages CO2 BT1
UNIT-III
Remote Monitoring, RMON SMI and MIB-RMON1, RMON2-System Utilities for Management, Tools-Network
Statistics Measurement Systems, Traffic Load-Protocol Statistics, Data and Error Statistics-Network Management
System, Components, Requirements System Management, Network Management Applications-Configuration
Management, Inventory Management -Performance Management Tools
PART-A (Multiple Choice Questions)
3
Which Counts the amount of traffic sent between each pair of
discovered network addresses in RMON2 Group
CO3 BT1
a. alHost
b. nlMatrix
c. probeconfig
d. protocolDist
4
The nslookup status monitoring tool is used to___________
a. Looks up DNSfor name-IP address translatlon CO3
BT1
b. Queries DNSserver
c. Obtains and conflgures networking interface. Parameters
d. Displays Information on Internet hosts/domains
5
Name the traffic monitoring Graphical tool to capture,to lnspect
and to save Ethernet packets
CO3
BT1
a. wireshark
b. getethers
c. iptrace
d. bing
6
Load statistics in an IP network can obtained by measuring IP
packets in the __________________level
CO3 BT1
a. Network layer
b. Application layer
c. Presentation layer
d. Session layer
7
A __________ is a logical circuit between two switching offices
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
9
Which management is normally used in the context of discovering
network topology
a. Configuration Management CO3
BT1
b. Inventory Management
c. Performance Management
d. Fault Management
10
Name the tool which is used to collect the traffic Statistics over a
period of time.
a. Multi Router Traffic Grapher BT1
CO3
b. Multi Packet Traffic Grapher
c. Remote Router Circuit Grapher
d. Remote Path circuit Grapher
11
The utilization factor in performance Management can be defined
in terms of
a. Collision rate BT1
CO3
b. Transmission rate
c. Error rate
d. Recovery Rate
12
Which algorithm controls the bandwidth of the access to the
service provider network.
a. Token Bucket CO3
BT1
b. Token Ring
c. Hop count
d. Protocoladdr
13
The RMON1 statistics function provides_____________-
a. Link level statistics CO3
BT1
b. Collects periodic statiscal data and stores for later retrieval
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
14
Which group provides informaton on the conversation between
pairs of hosts in both directions in RMON2 .
CO3 BT1
a. network- layer matrlx group
b. network-layer host group
c. Application - layer matrlx group
d. Application - layer host group
15
Which of the following is basic group and mandatory in RMON2
MIB Groups
CO3 BT1
a. rmon1EthernetEnchancementGroup
b. rmon1TokenRingEnchancementGroup
c. probeconfigurationGroup
d. a1HostGroup
16
The Traffic monitoring tool ‘ping’ is used for
a. Measuring round-trip packet loss CO3
BT1
b. Measures point-to-point bandwidth of a link
c. Measures performance of Gateways
d. Measures host addresses of an Ethernet LAN segment
17
Latency is caused by________
CO3 BT1
a. Retention in large bandwidth signal
b. Dispersion in large bandwidth signal
c. Retention in large propagation rate
d. Dispersion in low propagation rate
18
.Network Provisioning is a part of_________-
a. Inventory Management
b. Fault Management BT1
CO3
c. Configuration Management
d. Performance Management
19
Which command helps to discover network component that
responds with an ipaddress
CO3
BT1
a. arp
b. rap
c. ipr
d. ipn
20
Legacy inventory management system uses__________based
database systems
CO3 BT1
a. Non-hierarchial
b. Scalar
c. Relational
d. Non-scalar
21
The utilization factor can be defined in terms of_____________
a. Collision rate
b. Error rate
c. Peak load rate CO3 BT1
d. Throughput
22
Choose the metrics to measure the application responsiveness in
performance management
CO3 BT1
I. Response time
II. Burst frame rate
III. Auto recovery time
IV. Round trip time
a. Only III
b. I and II
c. I and IV
d. I and III
23
RMON2 works on____________
a. Physical Layer
b. Data Link Layer
CO3
c. Network layer BT1
d. Both a and b
24
.___________is used in automated circuit provisioning of trunks.
a. Trunk Integrated Record Keeping System CO3
BT1
b. Circuit Integrated Record Keeping System
c. Equipment Inventory system
d. Facilities inventory system
25 BT1
Name the group which is useful in tracking the overall trend in the CO3
volume of traffic in RMON1
a. Statistics group
b. History group
c. Host group
Alarm group Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
C
PART B (4 Marks)
1 CO3 BT1
Write about RMON and list out its advantages
2 CO3 BT2
List out the tools used in network management systems
3 CO3 BT2
Give some applications of network management systems
4 CO3 BT2
Write short notes about Network provisioning
5 CO3 BT1
Discuss about the Traffic Load Monitoring in Network statistics
Measurement systems
6 CO3 BT1
Write about the basic configuration of a Protocol Analyzer
7 CO3 BT1
Describe about RMON1 Textual conventions
8 CO3 BT2
Write about RMON2 Conformance specification
UNIT-IV
Network Management Applications, Fault Management Architecture-Fault location -Fault isolation Algorithm Self-
healing-Avoiding failures-Configuration setting- Configuration discovery and Change Control
Configuration Management Applications- Patch Management-Approaches for Performance Management-
Performance Monitoring and Reporting-Performance trouble shooting-Capacity Planning-Account Management-
Report Management-System and User Reports- Policy Management, Service Level Management
PART-A (Multiple Choice Questions)
Q. Questions Course Competence
No Outcome BT Level
1 Configuration Management can be divided into two subsystems:
Reconfiguration and
a. Documentation
b. Security CO4 BT1
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
c. Accounting
d. Performance
2 Based on the performance policy of network management,
BT1
Controlling access to the network is the task of CO4
a. Fault Management
b. Performance Management
c. Activation Management
d. Security management
3 Performance Management is closely related to
a. Risk management
b. Fault Management BT1
c. Security Management CO4
d. Configuration Management
4 Network provisioning System Also Called as
a. Circuit Provision system
b. Feed Back provision System CO4
c. Planning System BT1
d. Designing System
5 Fault Management Involves
1. Fault Detection
2. Fault location
3. Restoration of service & Problem Resolution CO4 BT1
4. Identification of Root problem
a.1,2 &3
b.1,2 & 4
c.1,2,3&4
d.1,2 &4
6 Fault detection is accomplished using ---------
a. Polling Scheme
b. SNMP BT1
c. NMS
CO4
d. RMON
7 RFC 2063 defines
a. Reporting of network Traffic
b. Reporting of network Fault
c. Reporting of network Error BT1
CO4
d. Reporting of network Failure
8 Which one of the following is not the Event Correlation techniques
a. Rule-based reasoning
b. Model-based reasoning
c. Case-based reasoning BT1
CO4
d. Inference Based reasoning
9 9.Accounting Management is useful for identifying Hidden cost with
the help of
a. RMON BT1
b.SNMP CO4
c.NMS
d.ICMP
10 Which one of the following is not the basic guidelines to setting up
policies and procedures of NDM
a. Identify what you are trying to protect CO4 BT1
b. Determine the network components
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
UNIT-V
Network Design and Planning- Network Design for Enterprise Network-Network Design Process,-Data Collection
Data Generation-Traffic Generators-Cost Generators,-Topology Architecture- Graph Link Algorithms-Network-Design
Techniques- Performance Analysis-Queuing Essentials- Loss and Delay-Reliability-Network Cost
PART-A (Multiple Choice Questions)
Q.No Questions Course Competence
Outcome BT Level
1 How many steps are required to design a network?
a. 7
b. 8
c. 2
d. 3 CO5 BT1
Ans: B
2 Which network design process stage involves determining the size of the
components used, the topology and cost of transmission?
a. Topological design CO5
b. Network-synthesis BT1
c. Network realization
d. Data Acquisition
Ans: B
3 _________models can be used at various phases of service and network
management life cycle such as service provision, optimization and CO5
monitoring. BT1
a. Data-Driven
b. Topological
c. Service
d. Network
Ans: A
4 ________based collection at network core devices is the most prevalent
data collection mechanism currently.
a. Packet
b. Log
CO5
c. Flow BT1
d. Service
Ans: C
5 The model that manages resources and presents the standard format
MOF.
a. CIM CO5
b. CIMOM BT1
c. XML API
d. Standard Module
Ans: A
6 In which of the following examples data generation is not involved:
a. Mobile Data
b. Internet CO5 BT1
c. Trading
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
d. Emotions
Ans: D
7 Which one is not a network traffic generator ?
a. Nping
b. Lping
c. NTGM
d. Trex CO5
BT1
Ans: B
8 TCP is reliable ?
a. True
b. False
CO5 BT1
Ans: A
9 Network Reliability is capacity of the network to offer ______ services
even during failure.
a. Different
b. Consistent
c. Same CO5 BT1
d. Uninterrupted
Ans: C
10 What is the cost of network security for small-sized network?
a. $(100-200)
b. $(200-300) CO5 BT1
c. $(300-400)
d. $(400-500)
Ans: A
11 Which is the best way to protect your organization’s cyber-
infrastructure?
a. Planned solution
b. Best security system
CO5 BT1
c. Thorough Network Security Solution
d. Research for solution
Ans: C
12 In Network Management System, maps track each piece of hardware
and its connection to the ___________
a. IP Server
b. Domain CO5 BT1
c. Network
d. Data
Ans: C
13 A network management system is a collection of _________for
network monitoring. CO5 BT1
a. Tools
b. Commands
c. Tasks
d. Components
Ans: A
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
Ans: C
18 A topology that is responsible for describing the geometric arrangement
of components that make up the LAN.
a. Complex
b. Physical CO5 BT1
c. Logical
d. Incremental
Ans: B
19 A term that refers to the way in which the nodes of a network are linked
together.
a. Network
b. Topology
c. Connection CO5 BT1
d. Interconnectivity
Ans: B
20 _______WAN can be developed using leased private lines or any other
transmission facility
a. Hybrids
b. Peer-to-peer CO5 BT1
c. Two-tiered
d. Three-tiered
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275
Ans: B
21 Multiplexing technique that shifts each signal to a different carrier
frequency
a. FDM
b. TDM CO5 BT1
c. Both FDM & TDM
d. None of the mentioned
Ans:A
22 _______ LAN topology describes the possible connections between
pairs of networked end-points that can communicate.
a. Complex
b. Physical CO5 BT1
c. Logical
d. Incremental
Ans: C
23 Which of the following is a part of Network identification ?
a. Password user
b. User-ID
c. OTP CO5 BT1
d. Finger print
Ans: B
24 What is a structured Network Design Process ?
Ans: A
25 Which of the following is not a source of packet delay in network
design ?
a. Processing
b. Queuing CO5 BT1
c. Transmission
d. Packaging
Ans: D
PART B (4 Marks)
1 Discuss the Network Design and Planning CO5 BT2